Summary
The security and information that assurance administrators can realistically provide is clearly never as exhaustive as it is exhausting.
In the first section of this chapter, you learned that hardware virtualization has inherent security benefits.
However, you also learned that many promising benefits are undermined if they're not supported by thorough planning of the virtual infrastructure, explicit policy-making up front, and a flawless deployment, all followed by unflagging policy enforcement and ongoing virtual server lifecycle management.
We then outlined threats that are either unique to virtualized infrastructures or aggravated in the context of virtualization. Each point was followed by either concrete action to mitigate the threat or links to resources for more details on addressing a potential problem.
We concluded with concrete, step-by-step remedies that could be initiated immediately, even as you continue to explore and assess Proxmox VE.